Adaptive Security Management Model in the Cloud Computing Environment

被引:0
|
作者
Jung, Youngmin [1 ]
Chung, Mokdong [1 ]
机构
[1] Pukyong Natl Univ, Dept Comp Engn, 599-1,Daeyeon 3 Dong, Busan, South Korea
来源
12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2 | 2010年
关键词
Security; Cloud Computing; Access Control; RBAC; DAA protocol;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper suggests an adaptive access algorithm to decide the access control to the resources using an improved RBAC technique to solve more complex and difficult problems in the cloud computing environment. And the proposed model determines dynamically security level and access control for the common resources. Therefore, it is supposed to provide appropriate security services according to the dynamic changes of the common resources.
引用
收藏
页码:1664 / 1669
页数:6
相关论文
共 50 条
  • [1] Analysing Security and Privacy Management For Cloud Computing Environment
    Gourkhede, Manish H.
    Theng, Deepti P.
    2014 FOURTH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT), 2014, : 677 - 680
  • [2] A Review on Security Issue in Security Model of Cloud Computing Environment
    Venkatakotireddy, G.
    Rao, B. Thirumala
    Vurukonda, Naresh
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY COMPUTATIONS IN ENGINEERING SYSTEMS, ICAIECES 2017, 2018, 668 : 207 - 212
  • [3] A Study on the Virtualization Security Management in the Cloud Computing Environment
    Cheong, Il-Ahn
    Lee, Seulgi
    Son, Kyungho
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 2035 - 2039
  • [4] System security model based on trusted access control under cloud computing environment
    Wang F.
    Wang, Fengqi (fengqiwang@21cn.com), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (10): : 236 - 242
  • [5] Research of Security Model and Cloud Computing Strategy
    Ma Yingrui
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 6196 - 6198
  • [6] Security Issues In Service Model Of Cloud Computing Environment
    Krishna, B. Hari
    Kiran, S.
    Murali, G.
    Reddy, R. Pradeep Kumar
    FOURTH INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTER SCIENCE & ENGINEERING (ICRTCSE 2016), 2016, 87 : 246 - 251
  • [7] Security of Cloud Computing Environment
    Karajeh, Huda
    Maqableh, Mahmoud
    Masa'deh, Ra'ed
    VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 2202 - 2215
  • [8] Research on the Security based on Utility Theory in Cloud Computing Environment
    Ju, JieHui
    Wang, ZhongYou
    Li, WenJuan
    Bao, WeiZheng
    Wang, Ya
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 321 - 328
  • [9] An access model under cloud computing environment
    Gu, Wen
    Yang, Cao
    Yi, Ying
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2020, 22 (2-3) : 328 - 334
  • [10] Adaptive resource management for spot workers in cloud computing environment
    Chen, Lung-Pin
    Leu, Fang-Yie
    Chiao, Hsin-Ta
    Shiu, Hung-, Jr.
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2022, 18 (04) : 437 - 452